Security News > 2018 > June

Terbium chief research officer Munish Walther-Puri explains how hacked data moves from your personal accounts to the Dark Web.

Earlier this year security researchers warned about vulnerable Apache Solr, Redis, and Windows servers hit with cryptominers. Imperva now says that that are still too many Internet-facing Redis...

New Android security features for the Pixel 2 prevent attackers from installing malicious firmware on the security module in a lost or stolen device.

A cyber-attack has brought the websites of both ticket distribution service Ticketfly – and the major venues it services – offline on Thursday.

Researchers discovered vulnerabilities in ten WordPress plugins made by a company for e-commerce websites powered by the WooCommerce platform. WordPress disabled many of them after the developer...

ALIS logistics software woes continue at US-UK training unit Delayed upgrades to F-35 fighter jets along with bespoke logistics software that displays spare part lead times in years are keeping...

Phishing attacks carried out via text messages that use the “Punycode” technique to make nefarious URLs look legitimate are becoming more popular, cloud security firm Zscaler says. read more

In a statement, the Chinese smartphone manufacturer advised their customers to use PIN codes instead.

Cybercrime: FBI Says Ransomware, Extortion Continue to DominateHackers have reportedly demanded a ransom from Bank of Montreal and Simplii Financial in exchange for not dumping 90,000 customers'...

JASK transforms how SOC operators visualize cyber attacks JASK is capturing industry demand with new features centered around enterprise-wide alert linkages and analyst workflow efficiency....